Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Information Systems Security Professional (CISSP)

Last Update 13 hours ago Total Questions : 1485

The Certified Information Systems Security Professional (CISSP) content is now fully updated, with all current exam questions added 13 hours ago. Deciding to include CISSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CISSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CISSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Information Systems Security Professional (CISSP) practice test comfortably within the allotted time.

Question # 61

What is the PRIMARY benefit of incident reporting and computer crime investigations?

A.

Providing evidence to law enforcement

B.

Repairing the damage and preventing future occurrences

C.

Appointing a computer emergency response team

D.

Complying with security policy

Question # 62

What is the PRIMARY objective of the post-incident phase of the incident response process in the security operations center (SOC)?

A.

improve the IR process.

B.

Communicate the IR details to the stakeholders.

C.

Validate the integrity of the IR.

D.

Finalize the IR.

Question # 63

Which of the following vulnerability assessment activities BEST exemplifies the Examine method of assessment?

A.

Ensuring that system audit logs capture all relevant data fields required by the security controls baseline

B.

Performing Port Scans of selected network hosts to enumerate active services

C.

Asking the Information System Security Officer (ISSO) to describe the organization’s patch management processes

D.

Logging into a web server using the default administrator account and a default password

Question # 64

Which of the following findings would MOST likely indicate a high risk in a vulnerability assessment report?

A.

Transmission control protocol (TCP) port 443 open

B.

Non-standard system naming convention used

C.

Unlicensed software installed

D.

End of life system detected

Question # 65

Physical assets defined in an organization’s Business Impact Analysis (BIA) could include which of the following?

A.

Personal belongings of organizational staff members

B.

Supplies kept off-site at a remote facility

C.

Cloud-based applications

D.

Disaster Recovery (DR) line-item revenues

Question # 66

Which of the following phases in the software acquisition process does developing evaluation criteria take place?

A.

Follow-On

B.

Planning

C.

Contracting

D.

Monitoring and Acceptance

Question # 67

A security professional needs to find a secure and efficient method of encrypting data on an endpoint. Which solution includes a root key?

A.

Bitlocker

B.

Trusted Platform Module (TPM)

C.

Virtual storage array network (VSAN)

D.

Hardware security module (HSM)

Question # 68

When designing on Occupent Emergency plan (OEP) for United states (US) Federal government facilities, what factor must be considered?

A.

location of emergency exits in building

B.

Average age of the agency employees

C.

Geographical location and structural design of building

D.

Federal agency for which plan is being drafted

Question # 69

Which of the following is critical if an empolyee is dismissed due to violation of an organization’s acceptable use policy (Aup) ?

A.

Appropriate documentation

B.

privilege suspension

C.

proxy records

D.

Internet access logs

Question # 70

Which of the following is MOST important when determining appropriate countermeasures for an identified risk?

A.

Interaction with existing controls

B.

Cost

C.

Organizational risk tolerance

D.

Patch availability

Question # 71

When testing password strength, which of the following is the BEST method for brute forcing passwords?

A.

Conduct an offline attack on the hashed password information.

B.

Conduct an online password attack until the account being used is locked.

C.

Use a comprehensive list of words to attempt to guess the password.

D.

Use social engineering methods to attempt to obtain the password.

Question # 72

What type of database attack would allow a customer service employee to determine quarterly sales results before they are publically announced?

A.

Polyinstantiation

B.

Inference

C.

Aggregation

D.

Data mining

Question # 73

What are the roles within a scrum methodoligy?

A.

System owner, scrum master, and development team

B.

prduct owner, scrum master, and scrum team

C.

Scrum master, requirements manager, and development team

D.

Scrum master, quality assurance team, and scrum team

Question # 74

Which of the following is an important design feature for the outer door o f a mantrap?

A.

Allow it to be opened by an alarmed emergency button.

B.

Do not allow anyone to enter it alone.

C.

Do not allow it to be observed by dosed-circuit television (CCTV) cameras.

D.

Allow it be opened when the inner door of the mantrap is also open

Question # 75

In the " Do " phase of the Plan-Do-Check-Act model, which of the following is performed?

A.

Monitor and review performance against business continuity policy and objectives, report the results to management for review, and determine and authorize actions for remediation and improvement.

B.

Maintain and improve the Business Continuity Management (BCM) system by taking corrective action, based on the results of management review.

C.

Ensure the business continuity policy, controls, processes, and procedures have been implemented.

D.

Ensure that business continuity policy, objectives, targets, controls, processes and procedures relevant to improving business continuity have been established.

Go to page: